Opening of the day

Cyber Security Challenges in Belgian Companies: Setting the Scene

Beltug the largest Belgian association of digital technology leaders, is in daily contact with companies. In this session Daniëlle Jacobs, General Manager of Beltug, will;

  • show the priorities of the companies on the level of cyber security;
  • talk briefly on European Directive on security of network and information systems (NIS) most companies will need to comply with;
  • give insights on companies & security in Belgium based on Beltug market research;
  • give insights on companies & security in Belgium based on the discussions on security within Beltug.

This session is meant to provide the audience a view of how companies are dealing with security issues.

Openings Keynote

EC3-The Fight Against Europe’s Cyber Criminals

In this session, Head of Europol’s European Cybercrime Centre, will share insights on how we can Fight Against Europe’s Cyber Criminals. Europol assists the 28 EU Member States in their fight against serious international crime and terrorism. Europol set up the European Cybercrime Centre (EC3) in 2013 to strengthen the law enforcement response to cybercrime in the EU and help protect European citizens, businesses and governments from online crime.

  • Are cyber-attacks on your enterprise a result of espionage, organised crime or a random attack
  • What have we learned from high-profile attacks in the last year and how can you adjust your security processes accordingly?
  • International collaboration models and open source platforms to keep you ahead of the threat.

The Curious Case of Security Convergence - Back to the Start

For over a decade, security convergence has been portrayed as the biggest challenge in the corporate security. But is it really the challenge many claim it is? Did the discussion not focus too much on ownership, rather than on outcome? This keynote tells Solvay’s story on how it ended up with an enterprise security risk management philosophy, and the challenges that shaped it’s direction.

Interactive session

Strategy Cafe

In this interactive session, we facilitate Business and ICT Professionals to discuss how they can support their projects and strengthen user-confidence and user-trust in their projects. By using an opinion poll, the attendees and experts will share their thoughts on Identify, Protect, Detect, Respond and Recover in the context of managing cybersecurity-related risk.

This session is supervised by chairman of the day Erik R. van Zuuren, with the assistance of various experts.


Handling sensitive data in healthcare from the viewpoint of a hospital that is also a software company

UZL wants to expose as much data as possible to its users (patients, external caregivers/providers) but do this in a secure way. Being an university hospital and a big software company, means facing a lot of challenges. In this keynote the lead IT architect and CIO of University Hospital Leuven will present their challenges, solutions and insights.

Exclusive session: Break-out session

European Framework for Certification and role of ENISA

Following the political agreement that was reached in December 2018, the EU Cybersecurity Act is finally on the last stretch and it is due for adoption by mid-2019. It is a significant milestone, which is expected to give a new impetus to the European industry while meeting policy requirements at Member States’ level. Under the Act, the key role reserved for ENISA is to assist in the preparation of candidate cybersecurity certification schemes. In doing so, ENISA needs to interact with both the EU Member States and the industry stakeholders, for collecting opinion and advice to feed into candidate schemes. ENISA looks forward to this newly acquired role and the opportunity it represents for cybersecurity in the EU. In this session Slawomir Górniak will point out the role of ENISA in this European Framework for Certification and what it means for (Belgian) industry in the longer term.

Exclusive session: Workshop

Incident handling workshop

When a cyber security incident occurs, what happens in the back-stage of the attacked organization? Take part in ISACA Belgium’s cyber security incident workshop, designed to simulate an attack, where you will be able to test your own capabilities by trying to respond to it! 

All the learning will happen by working in a team, later reviewing implications of your own decisions, comparing to how other teams handled the incident and finally, thanks to the expert’s feedback. 

After completing this session, you will be able to understand the cyber security incident process, especially how to respond to and communicate during an incident.

Break-out session

Five Essential Capabilities for Airtight Cloud Security

The cloud is a highly dynamic, flexible and infinitely configurable; simple changes to security policies can expose private resources to the world. There are a lot of moving parts - which means there can be oversights and errors. Security in the public cloud is fundamentally different from enterprise datacenter security. It’s essential for IT security pros to have visibility into network architectures and on-system controls to provide better defense against the growing number of malicious attacks and inadvertent credential leaks. In this session Check Point will gain insight in five essential capabilities to secure your vital cloud infrastructure end-to-end.

More coming soon...